diff --git a/Command and Control/python-use-by-ransomware-macos.md b/Command and Control/python-use-by-ransomware-macos.md new file mode 100644 index 00000000..02750d65 --- /dev/null +++ b/Command and Control/python-use-by-ransomware-macos.md @@ -0,0 +1,49 @@ +# Python usage associated with ransomware on macOS + +This query was originally published in the threat analytics report, *EvilQuest signals the rise of Mac ransomware*. + +As of the time of this writing (October 2020), ransomware designed to target macOS is relatively rare. EvilQuest is one of the few examples of this kind of malware on the platform. + +The query below can help locate an attempt to run Python in service of malicious activity by a remote operator. The command the query searches for is associated with, but not definitely indicative of, EvilQuest infections. + +Other queries related to EvilQuest ransomware can be found under the [See also](#see-also) section below. + +## Query + +```kusto +union DeviceFileEvents, DeviceProcessEvents +| where Timestamp >= ago(7d) +| where ProcessCommandLine contains "EIKKEIKK" and ProcessCommandLine contains "python" +``` + +## Category + +This query can be used to detect the following attack techniques and tactics ([see MITRE ATT&CK framework](https://attack.mitre.org/)) or security configuration states. + +| Technique, tactic, or state | Covered? (v=yes) | Notes | +|-|-|-| +| Initial access | | | +| Execution | v | | +| Persistence | | | +| Privilege escalation | | | +| Defense evasion | | | +| Credential Access | | | +| Discovery | | | +| Lateral movement | | | +| Collection | | | +| Command and control | v | | +| Exfiltration | | | +| Impact | | | +| Vulnerability | | | +| Misconfiguration | | | +| Malware, component | | | + +## See also + +* [Ransom note 'say' alert associated with ransomware on macOS](..\Impact\ransom-note-creation-macos.md) +* [Launching questd ransomware using osascript](..\Execution\launch-questd-w-osascript.md) +* [Reverse shell associated with ransomware on macOS](reverse-shell-ransomware-macos.md) + +## Contributor info + +**Contributor:** Microsoft Threat Protection team diff --git a/Command and Control/reverse-shell-ransomware-macos.md b/Command and Control/reverse-shell-ransomware-macos.md new file mode 100644 index 00000000..bf432ccb --- /dev/null +++ b/Command and Control/reverse-shell-ransomware-macos.md @@ -0,0 +1,49 @@ +# Reverse shell associated with ransomware on macOS + +This query was originally published in the threat analytics report, *EvilQuest signals the rise of Mac ransomware*. + +As of the time of this writing (October 2020), ransomware designed to target macOS is relatively rare. EvilQuest is one of the few examples of this kind of malware on the platform. + +The query below can help locate a reverse shell established by an attacker. The command the query searches for is associated with, but not definitely indicative of, EvilQuest infections. + +Other queries related to EvilQuest ransomware can be found under the [See also](#see-also) section below. + +## Query + +```kusto +union DeviceFileEvents, DeviceProcessEvents +| where Timestamp >= ago(7d) +| where ProcessCommandLine has "bash -i >& /dev/tcp/" +``` + +## Category + +This query can be used to detect the following attack techniques and tactics ([see MITRE ATT&CK framework](https://attack.mitre.org/)) or security configuration states. + +| Technique, tactic, or state | Covered? (v=yes) | Notes | +|-|-|-| +| Initial access | | | +| Execution | | | +| Persistence | | | +| Privilege escalation | | | +| Defense evasion | | | +| Credential Access | | | +| Discovery | | | +| Lateral movement | | | +| Collection | | | +| Command and control | v | | +| Exfiltration | | | +| Impact | | | +| Vulnerability | | | +| Misconfiguration | | | +| Malware, component | | | + +## See also + +* [Ransom note 'say' alert associated with ransomware on macOS](..\Impact\ransom-note-creation-macos.md) +* [Launching questd ransomware using osascript](..\Execution\launch-questd-w-osascript.md) +* [Python usage associated with ransomware on macOS](python-use-by-ransomware-macos.md) + +## Contributor info + +**Contributor:** Microsoft Threat Protection team diff --git a/Execution/launch-questd-w-osascript.md b/Execution/launch-questd-w-osascript.md new file mode 100644 index 00000000..85f0f75b --- /dev/null +++ b/Execution/launch-questd-w-osascript.md @@ -0,0 +1,50 @@ +# Launching questd ransomware using osascript + +This query was originally published in the threat analytics report, *EvilQuest signals the rise of Mac ransomware*. + +As of the time of this writing (October 2020), ransomware designed to target macOS is relatively rare. EvilQuest is one of the few examples of this kind of malware on the platform. + +The query below can detect events associated with the launch of the EvilQuest executable, *questd*, from the shell. + +Other queries related to EvilQuest ransomware can be found under the [See also](#see-also) section below. + +## Query + +```kusto +union DeviceFileEvents, DeviceProcessEvents +| where Timestamp >= ago(7d) +| where ProcessCommandLine has "osascript -e do shell script \"launchctl load" and +ProcessCommandLine contains "questd" +``` + +## Category + +This query can be used to detect the following attack techniques and tactics ([see MITRE ATT&CK framework](https://attack.mitre.org/)) or security configuration states. + +| Technique, tactic, or state | Covered? (v=yes) | Notes | +|-|-|-| +| Initial access | | | +| Execution | v | | +| Persistence | | | +| Privilege escalation | | | +| Defense evasion | | | +| Credential Access | | | +| Discovery | | | +| Lateral movement | | | +| Collection | | | +| Command and control | | | +| Exfiltration | | | +| Impact | v | | +| Vulnerability | | | +| Misconfiguration | | | +| Malware, component | | | + +## See also + +* [Ransom note 'say' alert associated with ransomware on macOS](..\Impact\ransom-note-creation-macos.md) +* [Reverse shell associated with ransomware on macOS](..\Command%20and%20Control\reverse-shell-ransomware-macos.md) +* [Python usage associated with ransomware on macOS](..\Command%20and%20Control\python-use-by-ransomware-macos.md) + +## Contributor info + +**Contributor:** Microsoft Threat Protection team diff --git a/Impact/ransom-note-creation-macos.md b/Impact/ransom-note-creation-macos.md new file mode 100644 index 00000000..f1e9ba61 --- /dev/null +++ b/Impact/ransom-note-creation-macos.md @@ -0,0 +1,49 @@ +# Ransom note 'say' alert associated with ransomware on macOS + +This query was originally published in the threat analytics report, *EvilQuest signals the rise of Mac ransomware*. + +As of the time of this writing (October 2020), ransomware designed to target macOS is relatively rare. EvilQuest is one of the few examples of this kind of malware on the platform. + +The query below can detect the creation of a ransom note according to the typical methods of EvilQuest operators. The command the query searches for is associated with, but not definitely indicative of, EvilQuest infections. + +Other queries related to EvilQuest ransomware can be found under the [See also](#see-also) section below. + +## Query + +```kusto +union DeviceFileEvents, DeviceProcessEvents +| where Timestamp >= ago(7d) +| where ProcessCommandLine has "say \\\"Your files are encrypted\\\" waiting until completion false" +``` + +## Category + +This query can be used to detect the following attack techniques and tactics ([see MITRE ATT&CK framework](https://attack.mitre.org/)) or security configuration states. + +| Technique, tactic, or state | Covered? (v=yes) | Notes | +|-|-|-| +| Initial access | | | +| Execution | | | +| Persistence | | | +| Privilege escalation | | | +| Defense evasion | | | +| Credential Access | | | +| Discovery | | | +| Lateral movement | | | +| Collection | | | +| Command and control | | | +| Exfiltration | | | +| Impact | v | | +| Vulnerability | | | +| Misconfiguration | | | +| Malware, component | | | + +## See also + +* [Launching questd ransomware using osascript](..\Execution\launch-questd-w-osascript.md) +* [Reverse shell associated with ransomware on macOS](..\Command%20and%20Control\reverse-shell-ransomware-macos.md) +* [Python usage associated with ransomware on macOS](..\Command%20and%20Control\python-use-by-ransomware-macos.md) + +## Contributor info + +**Contributor:** Microsoft Threat Protection team